openPR Logo
Press release

Bring-Your-Own-Device Creates Bandwidth Burden on Corporate Networks; Effective Traffic Management Tools can Contain Impact

01-24-2013 05:18 PM CET | IT, New Media & Software

Press release from: Blue Coat Systems

Shirley O’Sullivan, vice president of marketing for EMEA at Blue Coat Systems

Shirley O’Sullivan, vice president of marketing for EMEA at Blue Coat Systems

DUBAI, United Arab Emirates, 13th January, 2013: In a recent experiment, Blue Coat tracked the bandwidth burden of one employee with two iOS devices (an iPhone and iPad). For just those two weeks, the bandwidth impact on the corporate network was more than 39GB.

BYOD adoption has increased 15-fold since 2009 with 1.02 billion BYOD devices expected by the end of 2012. According to the recent Global Mobility Study conducted by IDG Research Services, 71 percent of employees report that they access the corporate network with their personally-owned smartphone. The additional bandwidth burden of these devices on the network can range from 4GB to more than 200GB in any given month.

Why Is Bandwidth Burden Happening
Since 2009, more than a billion Apple iOS and Google Android smartphones and tablets have been sold. These devices consume a significant amount of additional bandwidth, crowding out other applications on the network.

Data caps on cellular network and home broadband connections as well as app and software updates that require a WiFi connection mean that a disproportionate amount of this activity takes place on the corporate network. At the same time, the business doesn’t have the tools to see or control activity from these devices on the corporate network.

Bandwidth-consuming activities on smartphones include:

OS Updates and Upgrades: Carriers require devices be connected to a computer or Wi-Fi network for OS downloads that are up to hundreds of megabytes in size. The result: a single BYOD device can easily overwhelm network bandwidth with one click – and corporate networks and applications will be the losers.
App Downloads: More than 1.2M applications are readily accessible from Apple iTunes and Google Play, and the typical BYOD owner downloads over 40 applications. Apps can range in size from a few megabytes to hundreds of megabytes. Additionally, app updates are image files, so the impact to bandwidth is essentially the same as downloading the application for the first time with each new update.
Photo and Video Uploads: Cameras built into smartphones can capture still photo, most at high resolution. Anyone can capture a photo (1-3MB) or video (25 MB; 230MB for a minute) and quickly upload it to a sharing site like iCloud or Flickr for co-workers, friends and family. The same photos and videos can be just as easily downloaded by co-workers, creating a double bandwidth impact.
Video and Rich Media Downloads: With video content readily available to consumers for download from iTunes, Amazon and others, users have never been able to so easily consume corporate bandwidth. HD videos average 3GB or more in sizes and a full season of a TV show, will consume even more. Additionally, mobile devices provide users with ready-access to the growing library of video content on the Internet. A typical YouTube video will consume 500Kbps, so a single user in a remote office with a T1 connection will consume 33 percent of the bandwidth for as long as the video lasts.
Backup to Cloud Storage: iCloud provides users with 5 GB of free storage in the cloud to sync content, such as photos, email, music, videos and applications across all devices. Incremental backups are performed daily and vary from a few kilobytes to as much as 20 megabytes depending on the amount of new data to sync. For example, calendar and web bookmarks are small while emails and photos and videos consume much more bandwidth.

What Can Businesses Do
Like corporate issued laptops, mobile devices are used at work for recreational activities. However, because BYOD devices are not inventoried or issued by companies, many IT departments have no idea how many devices are on their network, what applications they are using or how much bandwidth they are consuming. More importantly, they have no way to control the impact of these devices on the network. Without effective traffic management tools, IT operations is just along for the ride with BYOD.

To contain the impact these devices have on the corporate network, businesses require:

Visibility: Real-time view of all application and web content on the corporate network provides visibility into BYOD-driven traffic from millions of rich content sites and hundreds of enterprise applications.
Control: QoS policies enable network administrators to limit BYOD downstream and upstream traffic to a manageable portion of network capacity, enabling bursts when bandwidth is not needed by higher-priority business applications.
Optimization/Acceleration: Protocol optimization along with object caching of OS or app downloads or on-demand rich content reduces the impact of BYOD while enabling corporate video initiatives like training, communications, and access to documents.

Blue Coat has recently introduced a new plug-in for PacketShaper appliances that gives businesses visibility into and control over iCloud traffic on the network, which can consume tremendous amounts of bandwidth and degrade critical application performance this traffic. This plug-in complements an existing plug-in that allows businesses to see and control traffic from Apple software updates, including updates for Apple iTunes, Safari browser and iOS. With these, businesses can mitigate the bandwidth burden of BYOD initiatives on the corporate network.

The plug-in is part of Blue Coat’s ongoing commitment to helping businesses manage the increasing use of personal devices in the corporate environment.

“Blue Coat understands there is no one-size-fits-all BYOD solution. That’s why we’re continuing to deliver flexible solutions that businesses can customize according to their corporate needs and policies,” said Shirley O’Sullivan, vice president of marketing for EMEA at Blue Coat Systems. “With the latest PacketShaper plug-in for iCloud, Blue Coat customers can manage personal devices and applications with the same vigilance they apply to corporate-owned resources to ensure business needs always take priority.”

About Blue Coat Systems
Blue Coat Systems provides Web security and WAN optimization solutions to 86 percent of FORTUNE Global 500 companies. As the market share leader in the secure web gateway market, Blue Coat sets the standard for enterprise security. Its solutions provide the visibility, protection and control required to optimize and secure the flow of information to any user, on any network, anywhere. For additional information, please visit www.bluecoat.com.

For more information, please contact:

Manal Abi Rafeh
Blue Coat Systems ME
Telephone: +971 4  3911620
Fax: +971 4 3911635
Email: manal.abirafeh@Blue Coat.com

Media Contact:
Colin Saldanha
PR Consultant
PROCRE8
Villa 41, 81-d Street, Uptown Mirdif
P.O. Box 78835, Dubai
United Arab Emirates

This release was published on openPR.

Permanent link to this press release:

Copy
Please set a link in the press area of your homepage to this press release on openPR. openPR disclaims liability for any content contained in this release.

You can edit or delete your press release Bring-Your-Own-Device Creates Bandwidth Burden on Corporate Networks; Effective Traffic Management Tools can Contain Impact here

News-ID: 248864 • Views:

More Releases from Blue Coat Systems

Blue Coat Appoints Chris Moore as Head of Middle East Sales Team
Blue Coat Appoints Chris Moore as Head of Middle East Sales Team
Dubai, United Arab Emirates, 20th February 2013 – Blue Coat Systems, Inc. a market and technology leader of Web security and WAN optimisation solutions, today announced the appointment of Chris Moore as the Regional Sales Director for its operations in the Middle East. The appointment comes at a time when Blue Coat is poised to expand its presence in the region. Reporting directly to the Vice President of EMEA Sales, Stuart
Borusan Holdings in Egypt Enhances Web Access Control and Security with Blue Coat ProxySG 900 Appliances
Borusan Holdings in Egypt Enhances Web Access Control and Security with Blue Coa …
DUBAI, United Arab Emirates, 18th February, 2013 – Blue Coat Systems, Inc., a market leader in Web security and WAN optimization, has announced the successful installation of the Blue Coat ProxySG 900 appliance for Turkish conglomerate, Borusan Holdings. The Group's employees are now protected by Blue Coat's market leading secure web gateway appliance, which delivers visibility, control and security of internet activity with the addition benefit of vastly improved bandwidth
‘Exploit Kits are the Latest Weapons of Cyber Destruction’, Warns Security Expert
‘Exploit Kits are the Latest Weapons of Cyber Destruction’, Warns Security E …
DUBAI, United Arab Emirates, 4 February, 2013: Malware is a business; people make their living writing and distributing it. Exploit kits are an effective and streamlined methodology of distributing malware; they allow the ‘Bad Guys’ to distribute payloads at a higher level than we have seen in the past. For this reason we've seen exploit kits grow in popularity over the last few years. Chris Larsen, Malware Research Team Leader at

More Releases for BYOD

BYOD & Enterprise Mobility Market 2021 | Detailed Report
The BYOD & Enterprise Mobility research report undoubtedly meets the strategic and specific needs of the businesses and companies. The report acts as a perfect window that provides an explanation of market classification, market definition, applications, market trends, and engagement. The competitive landscape is studied here in terms of product range, strategies, and prospects of the market’s key players. Furthermore, the report offers insightful market data and information about the
BYOD Security Market - Growth, Trends and Forecast 2023
Bring your own device (BYOD) refers to computing devices such as smartphones and tablets that employees bring to the workplace on the secure corporate networks. These mobile devices are prone to viruses and other potential risks such as cyber attacks. BYOD security solutions protect such devices from security threats that can harm the intellectual property of the organization. Additionally, these security solutions aid employees to take optimum advantage of mobile
Endpoint Security Market Emerging concept of (BYOD)
According to a new report composed by Transparency Market Research (TMR), the global endpoint security market is highly fragmented, characterized by the occupancy of several large multinational, regional, and small-scale vendors. Intense competitive environment of the market has compelled vendors to distinguish their product & service offerings by adhering to unique and clear value propositions. In order to enhance their product portfolio, well-established companies in the market are focusing on
BYOD Security Market : Global Forecast over 2023
Bring your own device (BYOD) refers to computing devices such as smartphones and tablets that employees bring to the workplace on the secure corporate networks. These mobile devices are prone to viruses and other potential risks such as cyber attacks. BYOD security solutions protect such devices from security threats that can harm the intellectual property of the organization. Additionally, these security solutions aid employees to take optimum advantage of mobile
Global BYOD Security Market Reports, 2015-2021
BYOD i.e. bring your own device, is also referred as bring your own technology (BYOT), and bring your own phone (BYOP). It is a practice in which employee of the organization allowed to bring personally owned devices (tablets and smart phones) to their workplace and permitted to use these devices to access privileged company information and applications. Many IT departments struggling to keep updated with yearly changing technology hence increasing
Global BYOD Security Market, 2015 – 2021
BYOD i.e. bring your own device, is also referred as bring your own technology (BYOT), and bring your own phone (BYOP). It is a practice in which employee of the organization allowed to bring personally owned devices (tablets and smart phones) to their workplace and permitted to use these devices to access privileged company information and applications. Many IT departments struggling to keep updated with yearly changing technology hence increasing